2008 |
30 | EE | Chik How Tan:
Insider-secure Signcryption KEM/Tag-KEM Schemes without Random Oracles.
ARES 2008: 1275-1281 |
29 | EE | Chik How Tan:
Signcryption Scheme in Multi-user Setting without Random Oracles.
IWSEC 2008: 64-82 |
28 | EE | Chik How Tan:
Secure public-key encryption scheme without random oracles.
Inf. Sci. 178(17): 3435-3442 (2008) |
2007 |
27 | EE | Chik How Tan,
Joseph Chee Ming Teo,
Jens-Are Amundsen:
Authenticated Broadcast Encryption Scheme.
AINA Workshops (1) 2007: 512-518 |
26 | EE | Chik How Tan:
Insider-secure Hybrid Signcryption SchemeWithout Random Oracles.
ARES 2007: 1148-1154 |
25 | EE | Chik How Tan,
Joseph Chee Ming Teo:
Protection AgainstWeb-based Password Phishing.
ITNG 2007: 754-759 |
24 | EE | Joseph Chee Ming Teo,
Chik How Tan:
Denial-of-service resilience password-based group key agreement for wireless networks.
Q2SWinet 2007: 136-143 |
23 | EE | Chik How Tan:
Security Analysis of Joint Group Key Agreement Protocol.
IEICE Transactions 90-A(9): 1876-1878 (2007) |
22 | EE | Chik How Tan:
Forgery of Provable Secure Short Signcryption Scheme.
IEICE Transactions 90-A(9): 1879-1880 (2007) |
21 | EE | Joseph Chee Ming Teo,
Chik How Tan,
Jim Mee Ng:
Denial-of-service attack resilience dynamic group key agreement for heterogeneous networks.
Telecommunication Systems 35(3-4): 141-160 (2007) |
2006 |
20 | EE | Tarjei K. Mandt,
Chik How Tan:
Certificateless Authenticated Two-Party Key Agreement Protocols.
ASIAN 2006: 37-44 |
19 | EE | Chik How Tan,
Joseph Chee Ming Teo:
Energy-efficient ID-based group key agreement protocols for wireless networks.
IPDPS 2006 |
18 | EE | Joseph Chee Ming Teo,
Chik How Tan,
Jim Mee Ng:
Low-power group key agreement for heterogeneous wireless networks.
IWCMC 2006: 177-182 |
17 | EE | Chik How Tan:
A secure signature scheme.
IWCMC 2006: 195-200 |
16 | EE | Chik How Tan:
Chosen Ciphertext Security from Identity-Based Encryption Without Strong Condition.
IWSEC 2006: 292-307 |
15 | EE | Chik How Tan:
Public-Key Encryption from ID-Based Encryption Without One-Time Signature.
OTM Workshops (1) 2006: 450-459 |
14 | EE | Chik How Tan:
Security Analysis of Signcryption Scheme from q-Diffie-Hellman Problems.
IEICE Transactions 89-A(1): 206-208 (2006) |
13 | EE | Joseph Chee Ming Teo,
Chik How Tan,
Jim Mee Ng:
Security Analysis of Provably Secure Constant Round Dynamic Group Key Agreement.
IEICE Transactions 89-A(11): 3348-3350 (2006) |
12 | EE | Chik How Tan:
Signature Scheme in Multi-User Setting.
IEICE Transactions 89-A(5): 1339-1345 (2006) |
11 | EE | Joseph Chee Ming Teo,
Chik How Tan:
Authenticated Dynamic Group Key Agreement for Autoconfigurable Mobile Ad Hoc Networks.
IEICE Transactions 89-B(9): 2480-2492 (2006) |
10 | EE | Joseph Chee Ming Teo,
Chik How Tan,
Jim Mee Ng:
Low-power authenticated group key agreement for heterogeneous wireless networks.
IJSN 1(3/4): 226-236 (2006) |
9 | EE | Chik How Tan:
A new signature scheme without random oracles.
IJSN 1(3/4): 237-242 (2006) |
8 | EE | Chik How Tan:
Analysis of improved signcryption scheme with key privacy.
Inf. Process. Lett. 99(4): 135-138 (2006) |
2005 |
7 | EE | Xiaosong Hou,
Chik How Tan:
A New Electronic Cash Model.
ITCC (1) 2005: 374-379 |
6 | EE | Joseph Chee Ming Teo,
Chik How Tan:
Energy-efficient and scalable group key agreement for large ad hoc networks.
PE-WASUN 2005: 114-121 |
5 | EE | Chik How Tan:
Key Substitution Attacks on Provably Secure Short Signature Schemes.
IEICE Transactions 88-A(2): 611-612 (2005) |
4 | EE | Chik How Tan:
On the Security of Signcryption Scheme with Key Privacy.
IEICE Transactions 88-A(4): 1093-1095 (2005) |
2004 |
3 | EE | Chik How Tan:
Key Substitution Attacks on Some Provably Secure Signature Schemes.
IEICE Transactions 87-A(1): 226-227 (2004) |
2003 |
2 | EE | Chik How Tan,
Xun Yi,
Chee Kheong Siew:
A CCA2 Secure Key Encapsulation Scheme Based on 3rd Order Shift Registers.
ACISP 2003: 428-442 |
2001 |
1 | EE | Chik How Tan,
Xun Yi,
Chee Kheong Siew:
Signature Schemes Based on 3rd Order Shift Registers.
ACISP 2001: 445-459 |